In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 |
Fri, 16 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 15 May 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat openshift Ai Redhat satellite Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
|
| CPEs | cpe:/a:redhat:directory_server:11 cpe:/a:redhat:directory_server:12 cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_ai cpe:/a:redhat:satellite:6 cpe:/a:redhat:trusted_artifact_signer:1 cpe:/a:redhat:trusted_profile_analyzer:2 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat directory Server Redhat enterprise Linux Redhat openshift Redhat openshift Ai Redhat satellite Redhat trusted Artifact Signer Redhat trusted Profile Analyzer |
Wed, 14 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 May 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption. | |
| Title | Crossbeam-channel: crossbeam-channel vulnerable to double free on drop | |
| Weaknesses | CWE-415 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-05-13T21:47:24.951Z
Updated: 2025-09-26T06:42:35.219Z
Reserved: 2025-05-12T12:06:47.274Z
Link: CVE-2025-4574
Updated: 2025-05-14T13:30:50.043Z
Status : Awaiting Analysis
Published: 2025-05-13T22:15:25.143
Modified: 2025-05-16T14:43:56.797
Link: CVE-2025-4574
ReportizFlow